Skip to main content

Research Repository

Advanced Search

Outputs (274)

Skills in Sight: How Social Media Affordances Increase Network Awareness (2017)
Presentation / Conference Contribution
Buunk, I., Hall, H., & Smith, C. (2017). Skills in Sight: How Social Media Affordances Increase Network Awareness. In Proceedings of the 18th European Conference on Knowledge Management ECKM 2017

The discussion in this paper derives from an analysis of data from twenty interviews conducted with members of an online knowledge sharing platform between October 2016 and February 2017. The empirical work is part of a larger doctoral study that inv... Read More about Skills in Sight: How Social Media Affordances Increase Network Awareness.

Open-ended evolution in cellular automata worlds (2017)
Presentation / Conference Contribution
Andras, P. (2017). Open-ended evolution in cellular automata worlds. In ECAL 2017, the Fourteenth European Conference on Artificial Life (438-445). https://doi.org/10.1162/isal_a_073

Open-ended evolution is a fundamental issue in artificial life research. We consider biological and social systems as a flux of interacting components that transiently participate in interactions with other system components as part of these systems.... Read More about Open-ended evolution in cellular automata worlds.

ARIGAN: Synthetic Arabidopsis Plants using Generative Adversarial Network (2017)
Presentation / Conference Contribution
Giuffrida, M. V., Scharr, H., & Tsaftaris, S. A. (2017, October). ARIGAN: Synthetic Arabidopsis Plants using Generative Adversarial Network. Presented at 2017 IEEE International Conference on Computer Vision Workshops (ICCVW), Venice, Italy

In recent years, there has been an increasing interest in image-based plant phenotyping, applying state-of-the-art machine learning approaches to tackle challenging problems , such as leaf segmentation (a multi-instance problem) and counting. Most of... Read More about ARIGAN: Synthetic Arabidopsis Plants using Generative Adversarial Network.

Emergence of hierarchy from the evolution of individual influence in an agent-based model (2017)
Presentation / Conference Contribution
Perret, C., Powers, S. T., & Hart, E. (2017). Emergence of hierarchy from the evolution of individual influence in an agent-based model. In Proceedings of the 14th European Conference on Artificial Life 2017 (348-355)

The sudden transition from egalitarian groups to hierarchical societies that occurred with the origin of agriculture is one of the most striking features of the evolution of human societies. Hierarchy is reflected by the evolution of an asymmetrical... Read More about Emergence of hierarchy from the evolution of individual influence in an agent-based model.

Impact of selection methods on the diversity of many-objective Pareto set approximations (2017)
Presentation / Conference Contribution
Martí, L., Segredo, E., Sánchez-Pi, N., & Hart, E. (2017). Impact of selection methods on the diversity of many-objective Pareto set approximations. Procedia Computer Science, 112, 844-853. https://doi.org/10.1016/j.procs.2017.08.077

Selection methods are a key component of all multi-objective and, consequently, many-objective optimisation evolutionary algorithms. They must perform two main tasks simultaneously. First of all, they must select individuals that are as close as poss... Read More about Impact of selection methods on the diversity of many-objective Pareto set approximations.

Investigation of visual aspects of developmental dyslexia in children (2017)
Presentation / Conference Contribution
Piotrowska, B., Murray, J., Willis, A., & Kerridge, J. (2017). Investigation of visual aspects of developmental dyslexia in children. Journal of Vision, 17(10), 640. https://doi.org/10.1167/17.10.640

Developmental dyslexia is a disorder characterised by difficulties with reading, despite adequate intelligence and education. Phonological deficits are often indicated as the primary cause of dyslexia. Because a range of lower-level perceptual, atten... Read More about Investigation of visual aspects of developmental dyslexia in children.

Cryptography (2017)
Book
Buchanan, B. (2017). Cryptography. River Publishers

Cryptography has proven to be one of the most contentious areas in modern society. For some it protects the rights of individuals to privacy and security, while for others it puts up barriers against the protection of our society. This book aims to d... Read More about Cryptography.

ESBSC: Energy-Aware Service Brokering Strategy in Clouds (2017)
Presentation / Conference Contribution
Ma, F., Liu, X., Yang, Y., Yao, W., Cai, J., & Wang, F. (2017). ESBSC: Energy-Aware Service Brokering Strategy in Clouds. In Proceedings of the IEEE 41st Annual Computer Software and Applications Conference (COMPSAC). https://doi.org/10.1109/compsac.201

One of the key features of cloud computing is on demand resource provision. Unfortunately, different cloud service providers often have different standards, which makes the job of choosing the suitable resource to be a very difficult one for the comm... Read More about ESBSC: Energy-Aware Service Brokering Strategy in Clouds.

Home automation: HMM based fuzzy rule engine for Ambient intelligent smart space (2017)
Presentation / Conference Contribution
Singh Jamnal, G., Liu, X., & Fan, L. (2017). Home automation: HMM based fuzzy rule engine for Ambient intelligent smart space. In Proceedings of The 29th International Conference on Software Engineering and Knowledge Engineering

In this paper, we proposed a new type of decision making system to achieve the intelligent goal for automated smart environments. The artificial intelligence techniques, used as building blocks to understand inhabitant activity patterns. The collecte... Read More about Home automation: HMM based fuzzy rule engine for Ambient intelligent smart space.

Performance Evaluation of RPL Protocol under Mobile Sybil Attacks (2017)
Presentation / Conference Contribution
Medjek, F., Tandjaoui, D., Romdhani, I., & Djedjig, N. (2017). Performance Evaluation of RPL Protocol under Mobile Sybil Attacks. In 2017 IEEE Trustcom/BigDataSE/ICESS. https://doi.org/10.1109/trustcom/bigdatase/icess.2017.351

In Sybil attacks, a physical adversary takes multiple fabricated or stolen identities to maliciously manipulate the network. These attacks are very harmful for the Internet of Things (IoT) applications. In this paper we implemented and evaluated the... Read More about Performance Evaluation of RPL Protocol under Mobile Sybil Attacks.